cybersecurity cybersecurity
Stories About

cybersecurity

A signage of Microsoft is seen on March 13, 2020 in New York City. The U.S. government and Microsoft recently revealed that Chinese hackers broke in to online email systems and stole some unclassified information. Jeenah Moon/Getty Images hide caption

toggle caption
Jeenah Moon/Getty Images

Matt Ashley, a senior technologist at Johnson Memorial Health in Franklin, Indiana, is part of a small IT team that spent months helping the hospital recover after a crippling cyberattack in 2021. Farah Yousry/WFYI hide caption

toggle caption
Farah Yousry/WFYI

Servers at the All India Institute of Medical Sciences in New Delhi are still not back to normal two weeks after they were hacked and the data was held for ransom. Amal KS/Hindustan Times via Getty Images hide caption

toggle caption
Amal KS/Hindustan Times via Getty Images

Peiter Zatko, known by his hacker name "Mudge," talks about cybersecurity with the Senate Governmental Affairs committee on May 19, 1998. He's scheduled to testify again about his whistleblower complaint against Twitter on Sept. 13, 2022. (Photo by Douglas Graham/Congressional Quarterly/Getty Images) Douglas Graham/CQ-Roll Call, Inc via Getty Images hide caption

toggle caption
Douglas Graham/CQ-Roll Call, Inc via Getty Images

Harri Hursti told NPR he's been instructed not to open the box containing the Dominion ImageCast X machine that he bought on eBay for $1,200. Harri Hursti hide caption

toggle caption
Harri Hursti

Tesla CEO Elon Musk's legal team argues that allegations by Twitter's ex-security chief give him reason to pull out of his agreement to buy the Twitter. Here, Musk speaks at a meeting of energy, oil and gas executives in Norway on August 29. CARINA JOHANSEN/NTB/AFP via Getty Images hide caption

toggle caption
CARINA JOHANSEN/NTB/AFP via Getty Images

Elon Musk wants to get out of buying Twitter. A whistleblower's claims might help him

  • Download
  • <iframe src="https://www.npr.org/player/embed/1120867467/1120952720" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Peiter Zatko, Twitter's former security head, poses for a portrait on Aug. 22 in Washington, D.C. Zatko accused the company of ignoring major security vulnerabilities in an explosive whistleblower complaint. Matt McClain/The Washington Post via Getty Images hide caption

toggle caption
Matt McClain/The Washington Post via Getty Images

People shop at an Apple Store in Beijing on Sept. 28, 2021. Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices. Andy Wong/AP hide caption

toggle caption
Andy Wong/AP

Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly testifies before a House Homeland Security Subcommittee, at the Rayburn House Office Building on April 28 in Washington, D.C. Kevin Dietsch/Getty Images hide caption

toggle caption
Kevin Dietsch/Getty Images

A flag of the International Committee of the Red Cross flutters above the humanitarian organization's headquarters in Geneva on Sept. 29, 2021. The ICRC is pleading with hackers to keep stolen data confidential. Fabrice Coffrini/AFP via Getty Images hide caption

toggle caption
Fabrice Coffrini/AFP via Getty Images

A researcher recently found a vulnerability in a piece of software called Log4j, which is used in the programming language Java and essentially creates a log of activity that can enable a hacker to take over a device. Christopher Schirner/Flickr hide caption

toggle caption
Christopher Schirner/Flickr

Companies scramble to defend against newly discovered 'Log4j' digital flaw

  • Download
  • <iframe src="https://www.npr.org/player/embed/1064123144/1064221062" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Fuel holding tanks are pictured at Colonial Pipeline's Dorsey Junction Station in Woodbine, Maryland in May 2021, the month that a cyberattack disrupted gas supply to the eastern U.S. for several days. Drew Angerer/Getty Images hide caption

toggle caption
Drew Angerer/Getty Images

An alert on a suspected attack by state-backed Chinese hackers from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency in April. Jon Elswick/AP hide caption

toggle caption
Jon Elswick/AP

This Feb 23, 2019, file photo shows the inside of a computer. A ransomware attack paralyzed the networks of at least 200 U.S. companies, according to a cybersecurity researcher whose company was responding to the incident. Jenny Kane/AP hide caption

toggle caption
Jenny Kane/AP

FireEye CEO Kevin Mandia, SolarWinds CEO Sudhakar Ramakrishna and Microsoft President Brad Smith testify during a Senate Intelligence Committee hearing on Capitol Hill on Feb. 23, in Washington, D.C. The hearing focused on the 2020 cyberattack that resulted in a series of data breaches within several agencies and departments in the U.S. federal government. Drew Angerer/Getty Images hide caption

toggle caption
Drew Angerer/Getty Images

As Cyberattacks Surge, Biden Is Seeking To Mount A Better Defense

  • Download
  • <iframe src="https://www.npr.org/player/embed/1003262750/1003388042" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Hackers used the U.S. Agency for International Development's email marketing account to send messages that looked legitimate — but links in the email exposed recipients to malicious software, Microsoft says. Screen grab by Microsoft hide caption

toggle caption
Screen grab by Microsoft

A gas pump is marked "out of service" as cars line up May 11 at a Circle K in Charlotte, N.C., following a ransomware attack that shut down Colonial Pipeline. Logan Cyrus/AFP via Getty Images hide caption

toggle caption
Logan Cyrus/AFP via Getty Images

Pipeline Companies Will Have To Report Cyberattacks To The Government

  • Download
  • <iframe src="https://www.npr.org/player/embed/1000400943/1000400944" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript